• About communications
  • Current Issue
  • Digital Edition
  • Sample Issue
  • FAQs
  • Author Center
  • Author Guidelines
  • ACM Copyright Form
  • ACM Copyright Policy
  • ACM Author Rights
  • Submit a Video
  • Editor's Letters
  • Third-Party Material
  • Kudos Service
  • 2016 Editorial Calendar
  • Editorial Board
  • Editor's Letters
  • Editorial Staff
  • Contact Us
  • Mobile Apps
  • For Advertisers
  • Practice Archive


    Latest Practice Practice Archive 2020MarchFebruaryJanuary2019DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2018DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2017DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2016DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2015DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2014DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2013DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2012DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2011DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2010DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2009DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary2008DecemberNovemberOctoberSeptemberAugustJulyJuneMayAprilMarchFebruaryJanuary Refine your search:
    Archives

    The Practice archive provides access to all Practice articles published in past issues of Communications of the ACM.

    March 2020


    From Communications of the ACM

    Securing the Boot Process

    Securing the Boot Process

    The hardware root of trust.

    Jessie Frazelle | March 2020

    From Communications of the ACM

    Above the Line, Below the Line

    Above the Line, Below the Line

    The resilience of Internet-facing systems relies on what is above the line of representation.

    Richard I. Cook | March 2020